IT Management  >   Systems Operations  >  

Active Security Solutions

RSS Feed    Add to Google    Add to My Yahoo!
Active Security Solutions White Papers (View All Report Types)
10 Qualities of Effective Next-Generation Endpoint Security
sponsored by Bit9 + Carbon Black
WHITE PAPER: This checklist presents the 10 most essential qualities that make endpoint security effective against today's threats.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Bit9 + Carbon Black

4 differences between Citrix vs. VMware
sponsored by Citrix
WHITE PAPER: This white paper highlights a user-centric approach to desktop computing that improves the way people work and the way IT supports them. Download now to explore four reasons to go beyond the limitations of other desktop virtualization solutions with a user-centric approach.
Posted: 13 Nov 2015 | Published: 29 Aug 2014


Make PCI DSS Compliance Painless
sponsored by Bit9 + Carbon Black
WHITE PAPER: This white paper discusses how choosing the right security platform that can make meeting PCI DSS regulations significantly easier.
Posted: 04 Nov 2015 | Published: 17 Sep 2015

Bit9 + Carbon Black

Identification and Credentialing: Secure and Verify Identity with Biometrics
sponsored by Unisys
WHITE PAPER: This white paper highlights an identity and access management solution that utilizes biometrics. Learn how to implement a security architecture that grants access based on workflow, biometric types, and hardware and software vendors.
Posted: 06 Nov 2015 | Published: 30 Jun 2015


Secure Cloud Application Usage: Protect the Business Against Cloud-Based Threats
sponsored by IBM
WHITE PAPER: This essential solution brief highlights a SaaS solution that integrates cloud discovery, threat intelligence and prevention, policy enforcement, identity as a service, and more into one solution. Access now to see how this solution can simplify and secure your cloud application use as well as help protect against user and cloud-based threats.
Posted: 10 Nov 2015 | Published: 30 Sep 2015


The Rising Value - and Falling Cost - of App and Desktop Virtualization
sponsored by Citrix
WHITE PAPER: Access this white paper to examine the business drivers for desktop virtualization and its value for users, businesses, and IT. You'll also learn where costs are falling in the desktop virtualization architecture.
Posted: 12 Nov 2015 | Published: 29 Aug 2014


Preparing for the 2015 Holiday Threat Season
sponsored by Bit9 + Carbon Black
WHITE PAPER: Cybercriminals know that IT teams are often distracted during the holiday season, and they're ready to take advantage. Access this resource to learn how to avoid holiday season distractions and keep your business safe.
Posted: 09 Nov 2015 | Published: 09 Nov 2015

Bit9 + Carbon Black

Bring Security and Efficiency to Healthcare with Cloud Communications
sponsored by 8x8, Inc.
WHITE PAPER: This white paper explains how cloud computing can help you more efficiently share patient information without putting any of that sensitive data at risk.
Posted: 24 Nov 2015 | Published: 24 Nov 2015

8x8, Inc.

Best Practices for Securing Workloads in Amazon Web Services
sponsored by
WHITE PAPER: Access this informative resource to explore best practices for securely deploying enterprise workloads in AWS. You'll also learn how these tips can apply to securing workloads in other IaaS strategies.
Posted: 24 Nov 2015 | Published: 15 Apr 2015

Data Theft Prevention for Healthcare
sponsored by Raytheon|Websense
WHITE PAPER: This white paper outlines a data-centric approach to protecting data and staying in compliance without sacrificing efficient patient care.
Posted: 17 Nov 2015 | Published: 17 Nov 2015

Visit - a knowledge exploration and self-education tool about information technology.

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2015, TechTarget | Read our Privacy Statement